The Limits Of Social Media Soft Power

Watching the current war in Ukraine has been hard. Through vast volumes of social media, the bravery of Ukraine’s military and moral strength against Russian savagery has been nothing less than breath taking.  TikTok, Facebook, YouTube represent very effective methods of getting messages out worldwide.

In the newest domain, Cyber Space, social media platforms can - and in the case of Ukraine - have turned social media into soft power (uniting a fractious NATO) eventually into some hard power (supplying arms to Ukraine.) And it has certainly stirred the chattering political classes to a blood frenzy – Ukrainian blood, their frenzy.

However, such “soft power” derived from the Cyber Domain’s social media doesn’t ultimately stop hard bombs. Nor does it stop, the grinding, casualty adverse warfare from an opponent who could care less what you think and who is impervious to your soft power “social media.” And it will likely contribute to a numbing and decline of popular support. The Cyber Generation is about to find out there are limits to social media’s  power.

“Hard Power” Pipes and “Soft Power” Water

Cyber Space can be place where hard power is exercised. The sheer bluntness of “hard power” actions in cyber space – for example, shutting down an electrical power grid or fouling up a gas/oil pipeline systems – is a tricky business; especially when you effect large, traditionally non-combatant populations.
  
Russia, China, and  the U.S., all have organizations built to do “hard” power cyber – whether it be U.S. Cyber Command, or Russia’s APT 28/29, or China’s PLA Unit 61398.  However, there is a certain “mutually assured destruction” in this exercise of hard cyber power.  And it has been used gingerly.

Weak Power and Winning Domains

In the Cyber Domain, “Water” soft power has been used with glee - in the past by the Russians; today by Ukraine.  However, it has not translated well on the ground of the Ukraine battlefield.  Why? Russia’s success has been its adoption of the 20th century model of controlling the domains of land, sea, and air - where it has a clear advantage. 

And with superior numbers and fire power, Moscow and Putin seem intent on destroying a free Ukraine.  In short, Russia has neutralized the cyber “water” with a grinding type of warfare that is clearly working well  - especially when you can control the soft power of social media internally to your own country and don’t care about external social media; either dismissing it as lies and or simply ignoring it.

Information Fatigue Coming

Another challenge for social media soft power, soon to come, is the inevitable challenge of information fatigue.  We’ve seen this during the COVID crisis of the last two years.  People simply grow tired of the constant negative messages and “doom scrolling.”  The problem is this often happens well before the political leaders and opinion leaders in the press and “expert class” get the message. As I said, they are obsessed by the story.  The public busy with their daily concerns – sympathetic -- but less so. 

The decline of popular support - public fatigue - can start slowly and quickly build toward cynicism and a desire to disengage.  It must be constantly battled - especially through what will likely prove a long and difficult conflict as Ukraine.  Messaging supporting Ukraine and the war crimes of Russia must be kept up to battle it.  But, understand, there will be some loss of support over time as some people get sick of hearing it.

The Long Fight

In the final analysis, the best that social media can do right now is continue to provide justification and support to arming Ukraine to better fight in the other dimensions.  But, make no mistake, as vital as that is, it will not stop a determined and ruthless enemy from its goal.  

Like sanctions, social media has its limits.  And needs to be used along with hard power to win the day.


Ronald A. Marks III is a former CIA officer, Capitol Hill staff, and President of ZPN Cyber and National Security Strategies.  He is a Visiting Professor at George Mason University and a Senior Fellow at the Atlantic Council

You Might Also Read:

Twitter Joins Ukraine’s War Effort:

 

« The US Military Want 5G Fast
AI Fills In The Missing Gaps From Ancient Greece »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Atomicorp

Atomicorp

Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.

Averon

Averon

Averon's technology is the new gold standard for digital identity - the easiest, fastest and most secure verification solution for users on both WiFi and LTE.

Trapezoid

Trapezoid

Trapezoid is a cybersecurity company developing Firmware Integrity Management solutions designed to detect unauthorized changes to firmware & BIOS across the entire data center infrastructure.

Certis

Certis

Certis is a leading advanced integrated security organisation that develops and delivers multi-disciplinary security and integrated services.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

Searchlight Security

Searchlight Security

Searchlight Security is a leading darknet intelligence company. Working with law enforcement, industry, and end users to help protect society against the threats of the darknet.

CyberCatch

CyberCatch

CyberCatch provides an innovative cybersecurity Software-as-a-Service (SaaS) platform designed for SMBs.

BCyber

BCyber

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

Probity

Probity

Probity Inc. is a certified software development and systems engineering company, providing support to federal government and national defense related clients.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

TriCIS

TriCIS

TriCIS design and engineer highly secure integrated solutions that meet the highest government and military security standards, providing information assurance to organisations across the globe.

xdr.global

xdr.global

Xdr.global is a cybersecurity consulting firm, focused on promoting and aligning Extended Detection and Response (XDR) security solutions.

EPAM Systems

EPAM Systems

Since 1993, EPAM Systems has leveraged its advanced software engineering heritage to become a leading global digital transformation services provider.